// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ #define NET_BASE_SERVER_BOUND_CERT_SERVICE_H_ #pragma once #include #include #include #include "base/basictypes.h" #include "base/memory/scoped_ptr.h" #include "base/threading/non_thread_safe.h" #include "base/time.h" #include "net/base/completion_callback.h" #include "net/base/net_export.h" #include "net/base/ssl_client_cert_type.h" namespace base { class TaskRunner; } namespace net { class ServerBoundCertServiceJob; class ServerBoundCertServiceWorker; class ServerBoundCertStore; // A class for creating and fetching server bound certs. // Inherits from NonThreadSafe in order to use the function // |CalledOnValidThread|. class NET_EXPORT ServerBoundCertService : NON_EXPORTED_BASE(public base::NonThreadSafe) { public: // Opaque type used to cancel a request. typedef void* RequestHandle; // Password used on EncryptedPrivateKeyInfo data stored in EC private_key // values. (This is not used to provide any security, but to workaround NSS // being unable to import unencrypted PrivateKeyInfo for EC keys.) static const char kEPKIPassword[]; // This object owns |server_bound_cert_store|. |task_runner| will // be used to post certificate generation worker tasks. The tasks are // safe for use with WorkerPool and SequencedWorkerPool::CONTINUE_ON_SHUTDOWN. ServerBoundCertService( ServerBoundCertStore* server_bound_cert_store, const scoped_refptr& task_runner); ~ServerBoundCertService(); // Returns the domain to be used for |host|. The domain is the // "registry controlled domain", or the "ETLD + 1" where one exists, or // the origin otherwise. static std::string GetDomainForHost(const std::string& host); // Fetches the domain bound cert for the specified origin of the specified // type if one exists and creates one otherwise. Returns OK if successful or // an error code upon failure. // // |requested_types| is a list of the TLS ClientCertificateTypes the site will // accept, ordered from most preferred to least preferred. Types we don't // support will be ignored. See ssl_client_cert_type.h. // // On successful completion, |private_key| stores a DER-encoded // PrivateKeyInfo struct, and |cert| stores a DER-encoded certificate, and // |type| specifies the type of certificate that was returned. // // |callback| must not be null. ERR_IO_PENDING is returned if the operation // could not be completed immediately, in which case the result code will // be passed to the callback when available. // // |*out_req| will be filled with a handle to the async request. This handle // is not valid after the request has completed. int GetDomainBoundCert( const std::string& origin, const std::vector& requested_types, SSLClientCertType* type, std::string* private_key, std::string* cert, const CompletionCallback& callback, RequestHandle* out_req); // Cancels the specified request. |req| is the handle returned by // GetDomainBoundCert(). After a request is canceled, its completion // callback will not be called. void CancelRequest(RequestHandle req); // Returns the backing ServerBoundCertStore. ServerBoundCertStore* GetCertStore(); // Public only for unit testing. int cert_count(); uint64 requests() const { return requests_; } uint64 cert_store_hits() const { return cert_store_hits_; } uint64 inflight_joins() const { return inflight_joins_; } private: friend class ServerBoundCertServiceWorker; // Calls HandleResult. // On success, |private_key| stores a DER-encoded PrivateKeyInfo // struct, |cert| stores a DER-encoded certificate, |creation_time| stores the // start of the validity period of the certificate and |expiration_time| // stores the expiration time of the certificate. Returns OK if successful and // an error code otherwise. // |serial_number| is passed in because it is created with the function // base::RandInt, which opens the file /dev/urandom. /dev/urandom is opened // with a LazyInstance, which is not allowed on a worker thread. static int GenerateCert(const std::string& server_identifier, SSLClientCertType type, uint32 serial_number, base::Time* creation_time, base::Time* expiration_time, std::string* private_key, std::string* cert); void HandleResult(const std::string& server_identifier, int error, SSLClientCertType type, base::Time creation_time, base::Time expiration_time, const std::string& private_key, const std::string& cert); scoped_ptr server_bound_cert_store_; scoped_refptr task_runner_; // inflight_ maps from a server to an active generation which is taking // place. std::map inflight_; uint64 requests_; uint64 cert_store_hits_; uint64 inflight_joins_; DISALLOW_COPY_AND_ASSIGN(ServerBoundCertService); }; } // namespace net #endif // NET_BASE_SERVER_BOUND_CERT_SERVICE_H_